CVE-2022-24312
📋 TL;DR
This vulnerability allows attackers to write arbitrary files to the Schneider Electric Interactive Graphical SCADA System Data Server through path traversal. Successful exploitation could lead to remote code execution. Affects Data Server versions V15.0.0.22020 and earlier.
💻 Affected Systems
- Interactive Graphical SCADA System Data Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with SYSTEM/root privileges leading to complete system compromise, SCADA control manipulation, and industrial process disruption.
Likely Case
File system manipulation allowing data corruption, denial of service, or privilege escalation leading to partial system control.
If Mitigated
Limited to file modification without execution if proper file permissions and integrity controls are in place.
🎯 Exploit Status
ZDI published advisory with technical details. No authentication required for exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V15.0.0.22021 or later
Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-01
Restart Required: Yes
Instructions:
1. Download patch from Schneider Electric portal. 2. Backup system. 3. Apply patch following vendor instructions. 4. Restart Data Server service. 5. Verify patch installation.
🔧 Temporary Workarounds
Network Segmentation
allIsolate SCADA Data Server from untrusted networks and internet
Access Control Lists
windowsRestrict network access to Data Server ports using firewall rules
netsh advfirewall firewall add rule name="Block SCADA Ports" dir=in action=block protocol=TCP localport=PORT_NUMBERS
🧯 If You Can't Patch
- Implement strict network segmentation to isolate SCADA systems
- Deploy application whitelisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check Data Server version in application interface or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Schneider Electric\IGSS\DataServer\Version
Check Version:
reg query "HKLM\SOFTWARE\Schneider Electric\IGSS\DataServer" /v Version
Verify Fix Applied:
Verify version is V15.0.0.22021 or later and test file write functionality is restricted
📡 Detection & Monitoring
Log Indicators:
- Unusual file write operations in Data Server logs
- Failed path traversal attempts in application logs
- Unexpected process creation from Data Server
Network Indicators:
- Malformed messages to Data Server port
- Unusual traffic patterns to SCADA systems
SIEM Query:
source="scada_server" AND (event="file_write" OR event="path_traversal")